1-May/041766.html.
Has anyone else done something like this? Any references or suggestions
are appreciated.
Thanks,
Steve
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
or command option that we
must use on newer GnuPG to request larger keys to be generated on our
Yubikeys. Can someone point me in the right direction for this information?
Thanks,
--
R. Steve McKown
Titanium Mirror, Inc.
signature.asc
Description: OpenPGP digital signature
___
On 04/09/2017 08:49 PM, NIIBE Yutaka wrote:
> Steve McKown wrote:
>> Can someone explain why ssh after sign asks for the passphrase again,
>> and what I might be able to do to avoid this condition? It's not a big
>> deal, but I do wonder if it suggests a misconfigurat
gs done:NNN]" that
is not present for auth or crypt operations.
Can someone explain why ssh after sign asks for the passphrase again,
and what I might be able to do to avoid this condition? It's not a big
deal, but I do wonder if it suggests a misconfi
Jim,
I don't use modern but I do have a script for classic that works in unattended
mode on a Linux box. The caller knows the input file name and the script knows
my passphrase -- default gpg_pass2. Hope this helps with gpg2! --Steve
$ cat gpg_encrypt
#!/bin/ksh
usage="gpg_encrypt
Go to any public key server and get that key ID.
However, before doing that, I'd first verify the checksum without using GnuPG.
That process should also have been described on the download page.
-Original Message-
From: Gnupg-users [mailto:gnupg-users-bounces+sbutler=fchn@gnupg.or
ut what they did wrong on their end.
On a couple of occasions I've had vendors send me their private key along with
the public key. [Holding head in hands!] You may need to hold their hands to
get this working right for you.
--Steve
--
CONFIDENTIALITY NOTICE: This e-mail message, includin
Already doing bulk intercept, now just legitimising it ...
Steve
--
NetTek Ltd UK mob +44 7775 755503
UK +44 20 3432 3735 / US +1 (650) 423 1390 / Fax +44 20 7483 2455
social id stevekennedyuk
Euro Tech News Blog http://eurotechnews.blogspot.com
_
> themselves trusted and included in the encryption list.
Unfortunately it doesn't matter if it's needed, it's becoming law (well
it's already law under RIP, but DRIP 'expires' this year, so now
enshrined under IP Act).
It's a blanked law to ensure what's being done al
he keys and if you refuse, you go to jail until
you do ...
There are other major issues like equipment interference and bulk
interception to name a few.
Steve
--
NetTek Ltd UK mob +44 7775 755503
UK +44 20 3432 3735 / US +1 (650) 423 1390 / Fax +44 20 7483 2455
social id stevekennedyuk
Euro T
Any "secure" storage for the passphrase will itself need a mechanism to
"unlock". This only digs the hole one more level down. Only you can decide
when to stop digging. But remember, whatever the automated script can do, a
human following the script can also do. [Note to self, use "hacker" i
Did you say this was on a VM? We've had corrupted files with 'cp' from one
file system to another on a VM box if it decided to do a vmotion while the copy
was in progress.
Just remember -- "To err is human, but to really foul things up you need a
computer."(Paul Ehrlich)
-Original Messag
Perhaps an ASCII download instead of binary? That would make the download file
larger!
-Original Message-
From: Gnupg-users [mailto:gnupg-users-bounces+sbutler=fchn@gnupg.org] On
Behalf Of Aaron Tovo
Sent: Tuesday, January 26, 2016 8:45 PM
To: gnupg-users@gnupg.org
Subject: Re: BAD
Either set --homedir on the command line or in the options file.
-Original Message-
From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of Jarle
Hammen Knudsen
Sent: Wednesday, December 16, 2015 8:19 AM
To: Gnupg-users@gnupg.org
Subject: Get gpg to use keyring files in the
There is under 1.4. Don't know if it is in v2. I'm not at my desk to pop the
script open. But you could pipe the passphrase via stain and tell gpg to
grab it from there. Be careful as that still leaves it in the clear to those
reading your script. Potential local users could also see it
bottom left,
and has fingerprint 85E3 8F69 046B 44C1 EC9F B07B 76D7 8F05 00D0 26C4.
The source in question is on GitHub at https://github.com/GPGTools/localizeXIB
<https://github.com/GPGTools/localizeXIB> and the binary is no longer required
to compile pinentry-mac.
Kind regards,
steve
-Original Message-
From: Werner Koch [mailto:w...@gnupg.org]
Sent: Friday, July 24, 2015 4:24 AM
On Thu, 23 Jul 2015 19:11, sbut...@fchn.com said:
> This is a snippet of the script I use to decrypt any file coming to me that
> has my private key (or my companies private key)
>
> $DFLT
This is a snippet of the script I use to decrypt any file coming to me that has
my private key (or my companies private key)
$DFLT gpg_pass2 \
| gpg --homedir $homedir --quiet --passphrase-fd 0 --no-tty --skip-verify \
--no-permission-warning --no-mdc-warning --batch \
--outp
gh my thumb drive at home to see if they are buried someplace there.
--Steve
-Original Message-
From: Gnupg-users [mailto:gnupg-users-boun...@gnupg.org] On Behalf Of A.T.
Leibson
Sent: Tuesday, June 16, 2015 6:50 AM
To: Gnupg-users@gnupg.org
Subject: Teaching GnuPG to noobs
Hi everyone,
MFPA:
>
>
> On Monday 1 June 2015 at 5:37:33 PM, in
> ,
> gnupg-us...@henk.geekmail.org wrote:
>
>
>> A comment worth reading in case one does not see it oneself IMHO:
>> https://blogs.fsfe.org/gerloff/2015/06/01/facebook-offers-to-send-you
>> -encrypted-emails-this-wont-help-you/
>
> Whatev
cket? Or another length
byte?
--Steve
PS I've been using GnuPG for well over a decade and have run into this problem
on occasion. Always a re-encrypt has solved it. With this client that is no
longer the case.
Stephen M. Butler, PMP, PSM
IT Manager - Software Engineering
First Choice Hea
NSA or GCHQ taking in
every single email that crossed their borders.
--
Steve Jones
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC 4272 2AC8 A680 7167 C896
pgpb9gmjiGWFb.pgp
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-u
o email
the person anyway you might as well have some confidence that you're
using the right key.
--
Steve Jones
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC 4272 2AC8 A680 7167 C896
signature.asc
Description: PGP signature
___
Gnupg-us
ecurely? If the keyserver has certified the key with a
challenge response protocol you've got your answer.
Ideally you'd have an email address and a fingerprint, but often you
don't.
--
Steve Jones
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC 4272 2AC8 A680 7167 C896
signature.
a lot harder.
I assume this has already been discussed on some key server devel list? But
have not followed that discussion, so I’m not aware.
All the best,
steve
Am 22.07.2014 um 16:27 schrieb Werner Koch :
> On Tue, 22 Jul 2014 09:40, enigm...@josuttis.de said:
>> More and more w
t; a hobby :).
Sure. I will send you those keys by direct email.
Steve
--
Steve Strobel
Link Communications, Inc.
1035 Cerise Rd
Billings, MT 59101-7378
(406) 245-5002 ext 102
(406) 245-4889 (fax)
WWW: http://www.link-comm.com
MailTo:steve.stro...@link-comm.com
com/temp/small.txt>
<http://link-comm.com/temp/big.txt>
Thanks, Peter and Johan, for your help.
Steve
--
Steve Strobel
Link Communications, Inc.
1035 Cerise Rd
Billings, MT 59101-7378
(406) 245-5002 ext 102
(406) 245-4889 (fax)
WWW: http://www.link-comm.com
MailTo:steve.stro...@link-c
IDLINKTDS
I would be glad to send the keyring file if that would make troubleshooting
easier (the keys are not valuable). Thanks for any pointers.
Steve
--
Steve Strobel
Link Communications, Inc.
1035 Cerise Rd
Billings, MT 59101-7378
(406) 245-5002 ext 102
(406) 245-4889 (fax)
WWW: http
from the first
contact.
--
Steve Jones
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC 4272 2AC8 A680 7167 C896
signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
On Fri, 31 Jan 2014 15:02:14 +0100
NdK wrote:
> Il 31/01/2014 10:24, Steve Jones ha scritto:
>
> > Well the conventions of use, for example the key signing party
> > protocol, requires photographic id. If I publicly sign a key it has
> > to be in line with how I expec
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Fri, 31 Jan 2014 01:15:07 +
MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote:
> On Thursday 30 January 2014 at 10:43:39 PM, in
> , Steve Jones wrote:
>
> > Well therein lies my problem with the PGP system. It
> &
On Thu, 30 Jan 2014 21:09:45 +
MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote:
> On Thursday 30 January 2014 at 12:58:44 AM, in
> , Steve Jones wrote:
> > The advantage you have here though is the web of trust.
> > 1 level 1 signature would probably be not en
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On Thu, 30 Jan 2014 00:22:08 +
MFPA <2014-667rhzu3dc-lists-gro...@riseup.net> wrote:
> On Tuesday 28 January 2014 at 11:37:25 PM, in
> , Steve Jones wrote:
>
>
> > A more sophisticated approach
> > would b
sily-noticed.
Maybe, a lot of compromised actors have gotten away with it for a long
time. But that's a different story, all the trust in a person's key and
identity is useless if they're secretly working against you.
- --
Steve Jones
Key fingerprint: 3550 BFC8 D7B
On Wed, 29 Jan 2014 11:14:11 +
"nb.linux" wrote:
> Gregor Zattler:
> > Hi Steve, gnupg users,
> > * Steve Jones [24. Jan. 2014]:
> > That's an interesting idea. But there is still the possibility
> > of a man in the middle attac... The web of tru
On Tue, 28 Jan 2014 20:13:30 +0100
Leo Gaspard wrote:
> On Fri, Jan 24, 2014 at 11:08:16PM +0000, Steve Jones wrote:
> > [...]
> >
> > Finally there's the possibility of explicit verification, if someone
> > sends me a challenge and I publish that challenge'
ontrol of that private key and
can publish to that blog.
Which reminds me that I'd really like an email client that
automatically signs keys at level 1 (persona) of anyone who replies
with a signed email that quotes a significant portion of the text I
sent, as this effectively counts as a challe
So I'm led to the idea that associating keys with areas on the web
where a person's work, writings, etc... are known is more important
than some sort of confirmation of a person's name, which is not even a
unique identifier. If, for example, you'd signed your commits to
monkeysph
ilar key and that key is one half a monitor in
> 'monitor' height
You can use the pgpdump tool to see all the data in a public key file. A given
key might contain lots of extra data beside the actual key, like signatures and
photos.
--
Steve Jones
Key fingerprint: 3550 BFC8 D7BA 428
um it would be useful to
be able to verify this. I'm curious what other people on this list think of
this.
[1] http://tools.ietf.org/html/rfc4880#section-5.11
--
Steve Jones
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC 4272 2AC8 A680 7167 C896
signature.asc
Description: PGP
've not heard of any issues with that setup, but your mileage may vary.
Thanks, that was quite helpful. I've found I can just delete the self
signatures on my UID and replace them with better ones but I can't see a way to
change the subkey binding signature.
--
Steve Jones
K
key to not use
SHA1 digests which it appears to be using, as well as listing SHA1 as my second
favourite algorithm.
--
Steve Jones
Key fingerprint: 3550 BFC8 D7BA 4286 0FBC 4272 2AC8 A680 7167 C896
signature.asc
Description: PGP signature
___
Gnup
Hi GNUPG team,
When I tried to do make operation i got the following error:
compress.o: In function
`do_compress':/home/steve/Desktop/gnupg-2.0.19/g10/compress.c:107: undefined
reference to `deflate'compress.o: In function
`init_uncompress':/home/steve/Desktop/gnupg-2.0.19/g10
Hi team,
I downloaded gnupg-2.0.19 and got several errors reported by ./configure. The
error message is very clear said i missed some library and corresponding FTP
link was provided. But i was prompt for username/password when try to access.
Below is the link example.
*** It is now required to b
Oh dear. I found it. The bug has been reported 2003:
https://bugs.launchpad.net/mailman/+bug/265961
I wish I had better coding skills, but I don't. Sorry I can't code the fix...
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
G
ter such a long time still breaks PGP/MIME?
All the best and kind regards,
steve
Am 29.06.2012 um 17:48 schrieb Robert J. Hansen:
> On 06/29/2012 08:06 AM, Brad Rogers wrote:
>>> If you ask on Enigmail mailing list, they will tell you that that
>>> issue is with Mailman (or
him. So I don't really see the
drama. Let's try to be constructive and solve problems. Not cause some where
there aren't any.
And as always: feel free to write a patch. :)
<3
steve
> Signierter PGP Teil
> > Why to move it to Enigmail list? That email which you q
wiki / faq (maybe editable by the users) would imo bring benefit to users,
trying to understand backgrounds.
@David let us know once you get the basic setup done. Would GitHub maybe be
sufficient as a wiki? I am sure there are other nice solutions around, too.
Cheers,
steve
>
> I cannot
orrect information to help users. So it might not be automatable
thus create more work.
Currently we encourage the user to send a test mail and do all this manually.
All the best,
steve
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Hey Robin,
I'll send you a testmail in a minute. I'm the guy from the GPGTools support
discussion we had today.
Talk to you off-list.
If any of the GnuPG wizards like to chime in on the technical side on the bug
tracker we're happy about any input.
Cheers,
steve
Am 22.0
Again, see above
>> Call me idealistic, but I think it's up to the community to make that
>> happen.
>
> I'm not trying to dissuade you, but the people you need to convince are
> not on this mailing list. :)
I am well aware of that fact. I just wanted to add my th
that privacy matters). Call me idealistic, but I think it's up to
the community to make that happen.
All the best,
steve
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
then could check and if my key is signed by someone
they know it's a lot of important information, right?
all the best, steve
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
mail still uses inline as a default
setting…
Cheers,
steve
signature.asc
Description: Message signed with OpenPGP using GPGMail
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ss of what else might be wrong.
I guess what I am suggesting is that the logic that causes gpg to
prompt for a passphrase either has a problem or my understanding of
it does. Whether the problem you are experiencing on a Windows
system is related at all is a question I can't answer.
Th
-conflict .
That works perfectly. Thanks a bunch.
Steve
---
Steve Strobel
Link Communications, Inc.
1035 Cerise Rd
Billings, MT 59101-7378
(406) 245-5002 ext 102
(406) 245-4889 (fax)
WWW: http://www.link-comm.com
MailTo:steve.stro...@link-comm.com
At 12:50 PM 5/16/2011, Robert J. Hansen wrote:
On Mon, 16 May 2011 11:32:15 -0600, Steve Strobel
wrote:
> root:~> gpg --import test-key.gpg
> gpg: key CBF38289 was created 137948617 seconds in the future
> (time warp or clock problem)
This is exactly what it
alidity: ultimate
[ultimate] (1). Test User (do not use)
What am I missing? I presume that there security implications of using
"--allow-non-selfsigned-uid"? Thanks for any suggestions.
Steve
---
Steve Strobel
Link Communications, Inc.
1035 Cerise Rd
Billings, MT 591
ttp://www.gpgtools.org/macgpg2.html
All the best,
steve
Am 15.02.2011 um 10:19 schrieb Werner Koch:
> Hi,
>
> thanks for explaining the project. I looked at your packes and found no
> reason not to include it. In particular the quick links to the license
> files were helpful for
e under RIP and you can be
prosecuted for refusing to hand over keys to encrypted systems.
It's unlikely a judge would find you guilty (or a jury) if you didn't
have the keys).
All in the name of terrorism though ...
Steve
--
NetTek Ltd UK mob +44 7775 755503
UK +44 20 7993 2612 / U
and I know of people who've
used it with postfix (configured as a mail filter.)
Steve
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.10 (Darwin)
iEYEARECAAYFAknOR4kACgkQX7YJI4BuyDSrnQCfQ3HjyT2VSwqaw6Hx0QrPyrUu
6Z0AoKi2PIMJG1h/kpyKPeP9lJ9y3gM/
=9O3c
-END PGP SIGNATURE-
_
Can anyone tell me how to replace a passphrase in a key - when the current
passphrase is unknown ?
regards
steve brockbank
No virus found in this outgoing message.
Checked by AVG - http://www.avg.com
Version: 8.0.176 / Virus Database: 270.10.10/1903 - Release Date: 1/19/2009
8:52 PM
; I'm uncertain that all other gpg users know it
petr.uzel> too. Especially when the message about missing pinentry is
petr.uzel> quite confusing.
Ah, sorry I misunderstood.
Steve
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.8 (Darwin)
iEYEARECA
27;, gpg works fine.
This sounds like normal behavior for su. "su -" is supposed to
simulate a full login of the target account; it discards most
environment. By contrast, "su" (without the minus) doesn't discard
the environment.
The su(1) manpage on your system should
trying to show how to preserve the integrity of
command-line arguments, and I completed glossed over the mechanics of
writing data to and reading data back from from the gpg process.
As you note, Runtime.exec does not start a shell; it's much closer in
spirit to C's execv than to perl&
y guess is that `"The', `Certificate', and `Key"', are being treated
as three separate arguments.
Try providing the command as a String[], e.g.
String cmd[] = {
"gpg",
"--homedir",
System.getProperty("user.dir&qu
output.txt 2>&1
That should give you stdout and stderr from cmd.exe, as well as
gpg.ext.
You might also try checking for differences between the set of
environment variables your batch file sees under Windows task manager
vs the set of environment variables your batch file sees from an
inte
t;open /Applications/Thunderbird.app", then Thunderbird
should see them. (~/.MacOSX/environment.plist doesn't seem like a
good option for this). gpg-agent's man page gives a pretty good
recipie for setting the environment variables.
HTH
Steve
-BEGIN PGP SIGNATURE-
Version: G
ting gpg's standard input from
pass.txt, like this:
o:\utilities\gpg
--homedir o:\utilities \
--passphrase-fd 0 \
--load-extension o:\utilities\idea.dll \
-o "o:\apricing\morgan_cds_20080229.txt" \
-d "o:\apricing\24476.txt.pgp" <
If you try to do the same thing with "gpg2 --decrypt", pinentry-curses
winds up getting "-END PGP MESSAGE-" as the passphrase.
(In my case, the workaround is "don't select the END line". I'm not
su
you'd walk in
with a bootable CD that contained your encrypted file, boot up, read
what you needed, then halt.
Steve
From: Philipp Gühring <[EMAIL PROTECTED]>
Date: Wed, 6 Feb 2008 02:22:09 +0100
Subject: Re: Safe decryption with GnuPG?
Message-ID: <[EMAIL PROTECTED]>
To:
you'd walk in
with a bootable CD that contained your encrypted file, boot up, read
what you needed, then halt.
Steve
From: Philipp Gühring <[EMAIL PROTECTED]>
Date: Wed, 6 Feb 2008 02:22:09 +0100
Subject: Re: Safe decryption with GnuPG?
Message-ID: <[EMAIL PROTECTED]>
To:
ve nothing to do with the file that they
send me, right?)
The symptom seem to match a little with what was described in:
http://marc.info/?l=gnupg-users&m=104982312123419&w=2
But, as that was supposed to be resolved 4 years ago, I hope that this
is just som
I have an application where I have data in memory that needs to be
encrypted without ever being written to disc, even temporarily.
Using PGP I can run "pgp -feat" and then pipe the data to the pgp
process. That works very well.
I have to do the same thing for GPG, but I can't figure out how t
at should I try next?
--
Steve Fabac
S.M. Fabac & Associates
816/765-1670
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
ice system to
encrypt a test file and transfer it to the production
system, I can decrypt the message without problem.
--
Steve Fabac
S.M. Fabac & Associates
1.2 pre-compiled and installed it and used it
to run the gpg commands above.
--
Steve Fabac
S.M. Fabac & Associates
816/765-1670
__
77 matches
Mail list logo